Associate Professor, Department of Computer Science&Engineering,Shanghai Jiaotong University
Verified email at - Homepage
Cited by
Cited by
When CSI meets public WiFi: inferring your mobile phone password via WiFi signals
M Li, Y Meng, J Liu, H Zhu, X Liang, Y Liu, N Ruan
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things
N Ruan, Y Hori
2012 International Conference on Selected Topics in Mobile and Wireless …, 2012
WiFind: Driver fatigue detection with fine-grained Wi-Fi signal features
W Jia, H Peng, N Ruan, Z Tang, W Zhao
IEEE Transactions on Big Data 6 (2), 269-282, 2018
Privacy-preserving selective aggregation of online user behavior data
J Qian, F Qiu, F Wu, N Ruan, G Chen, S Tang
IEEE transactions on computers 66 (2), 326-338, 2016
SPFM: Scalable and privacy-preserving friend matching in mobile cloud
M Li, N Ruan, QY Qian, H Zhu, X Liang, L Yu
IEEE Internet of Things Journal 4 (2), 583-591, 2016
On the strategy and behavior of bitcoin mining with n-attackers
H Liu, N Ruan, R Du, W Jia
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
Toward optimal dos-resistant authentication in crowdsensing networks via evolutionary game
N Ruan, L Gao, H Zhu, W Jia, X Li, Q Hu
2016 IEEE 36th International Conference on Distributed Computing Systems …, 2016
Efficient and enhanced broadcast authentication protocols based on multilevel μTESLA
X Li, N Ruan, F Wu, J Li, M Li
2014 IEEE 33rd International Performance Computing and Communications …, 2014
Crowdsourced time-sync video tagging using semantic association graph
W Yang, N Ruan, W Gao, K Wang, W Ran, W Jia
2017 IEEE International Conference on Multimedia and Expo (ICME), 547-552, 2017
Elliptic curve ElGamal threshold-based key management scheme against compromise of distributed RSUs for VANETs
N Ruan, T Nishide, Y Hori
Information and Media Technologies 7 (4), 1588-1595, 2012
A novel broadcast authentication protocol for internet of vehicles
N Ruan, M Li, J Li
Peer-to-Peer Networking and Applications 10 (6), 1331-1343, 2017
De-anonymizing social networks: Using user interest as a side-channel
S Lai, H Li, H Zhu, N Ruan
2015 IEEE/CIC International Conference on Communications in China (ICCC), 1-5, 2015
A generic evaluation method for key management schemes in wireless sensor network
R Na, Y Ren, Y Hori, K Sakurai
Proceedings of the 5th International Conference on Ubiquitous Information …, 2011
Privacy-preserving mining of association rules for horizontally distributed databases based on FP-tree
Y Jin, C Su, N Ruan, W Jia
International conference on information security practice and experience …, 2016
Automatic detection of SIP-aware attacks on VoLTE device
S Zhang, L Zhou, ML Wu, Z Tang, N Ruan, H Zhu
2016 IEEE 84th Vehicular Technology Conference (VTC-Fall), 1-5, 2016
Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process
N Ruan, Y Ren, Y Hori, K Sakurai
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
Efficient and secure message authentication in cooperative driving: A game-theoretic approach
L Gao, N Ruan, H Zhu
2016 IEEE International Conference on Communications (ICC), 1-6, 2016
A differentially private selective aggregation scheme for online user behavior analysis
J Qian, F Qiu, F Wu, N Ruan, G Chen, S Tang
2015 IEEE Global Communications Conference (GLOBECOM), 1-6, 2015
GADM: Manual fake review detection for O2O commercial platforms
N Ruan, R Deng, C Su
Computers & Security 88, 101657, 2020
Revealing your mobile password via WiFi signals: Attacks and countermeasures
Y Meng, J Li, H Zhu, X Liang, Y Liu, N Ruan
IEEE Transactions on Mobile Computing 19 (2), 432-449, 2019
The system can't perform the operation now. Try again later.
Articles 1–20